chapter 6 infosec

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

The dominant architecture used to secure network access today is the __________ firewall. static bastion unlimited screened subnet

Screened subnet

Which of the following is not a major processing mode category for firewalls? Packet-filtering Application Layer Proxy Media Access Control Layer ​ Router passthru

router passthru

​Accountability is the matching of an authenticated entity to a list of information assets and corresponding access levels.

False, Authorization

The screened subnet protects the DMZ systems and information from outside threats by providing a network with intermediate security, which means the network is less secure than the general-public networks but more secure than the internal network.

False, it is more secure than general public networks but less secure than the internal network

The ability of a router to restrict traffic to a specific service is an advanced capability and not considered a standard feature for most routers.

False, it is standard

Discretionary access control is an approach whereby the organization specifies use of resources based on the assignment of data classification schemes to resources and clearance levels to users.

False, nondisretionary

​Task-based controls are associated with the assigned role a user performs in an organization, such as a position or temporary assignment like project manager.

False, role based controls

Syntax errors in firewall policies are usually difficult to identify.

False, they are usually easy to identify

Telnet protocol packets usually go to TCP port __________, whereas SMTP packets go to port __________ 23, 52 80, 52 80, 25 23, 25

23, 25

The restrictions most commonly implemented in packet-filtering firewalls are based on __________. IP source and destination address Direction (inbound or outbound) TCP or UDP source and destination port requests All of the above

All of the above

__________ firewalls are designed to operate at the media access control sublayer of the data link layer of the OSI network model. MAC layer Circuit gateway Application gateway Packet-filtering

MAC Layer

Because the bastion host stands as a sole defender on the network perimeter, it is commonly referred to as the __________ host. trusted domain DMZ sacrificial

Sacrificial Host

__________ inspection firewalls keep track of each network connection between internal and external systems. Static Dynamic Stateful Stateless

Stateful

Which of the following versions of TACACS is still in use? TACACS Extended TACACS TACACS+ All of the above

TCACS+

Authentication is the process of validating and verifying an unauthenticated entity's purported identity

True

Good firewall rules include denying all data that is not verifiably authentic.

True

The application layer proxy firewall is capable of functioning both as a firewall and an application layer proxy server.

True

When Web services are offered outside the firewall, HTTP traffic should be blocked from internal networks through the use of some form of proxy access or DMZ architecture.

True

The application layer proxy firewall is also known as a(n) __________. application firewall client firewall proxy firewall All of the above

application firewall

A __________ filtering firewall can react to an emergent event and update or create rules to deal with the event. dynamic static stateful stateless

dynamic


Set pelajaran terkait

CSCI 387: Software Testing (Ole Miss)

View Set

Pharmacology Prep U Chapter 51: Diuretic Agents

View Set

Level D Unit 7: Completing the Sentences

View Set

Nutrition 225 OSU Final Study Guide

View Set